From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id 83E9D385840F; Sat, 13 Aug 2022 09:26:28 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 83E9D385840F From: "fsb4000 at yandex dot ru" To: gcc-bugs@gcc.gnu.org Subject: [Bug libstdc++/106607] New: Regex integer overflow on large backreference value Date: Sat, 13 Aug 2022 09:26:27 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: libstdc++ X-Bugzilla-Version: 13.0 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: fsb4000 at yandex dot ru X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: gcc-bugs@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-bugs mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Aug 2022 09:26:28 -0000 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=3D106607 Bug ID: 106607 Summary: Regex integer overflow on large backreference value Product: gcc Version: 13.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: libstdc++ Assignee: unassigned at gcc dot gnu.org Reporter: fsb4000 at yandex dot ru Target Milestone: --- Hello! I was fixing some MS STL issues with regex: GH-2168: integer overflow on la= rge backreference value and I added a test. After that I decided to try my test with LLVM libc++ and GNU libstdc++. LLVM libc++ passes my test. and libstdc++ doesn't pass it. ``` #include #include using namespace std; // GH-2168 : integer overflow on large backreference value int main() { try { // 4294967297 =3D 1 mod 2^32, so this will succeed if we don't chec= k for overflow. regex testRegex{R"((a)\4294967297)", regex_constants::ECMAScript}; assert(false); } catch (const regex_error& e) { assert(e.code() =3D=3D regex_constants::error_backref); } } ``` https://gcc.godbolt.org/z/nzET6nvxo=